Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud and edge, edge and edge networking system based on three-layer security tunnel technology

A security tunnel, edge technology, applied in the field of communication, can solve the problems of auditing, tracking difficulties, complex IP address management, loss of visibility, etc.

Active Publication Date: 2022-04-12
江苏博云科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing networking methods have the following problems: 1) If there are many applications, the IP address of each application must be exposed outside the cluster, which will lead to complex IP address management; 2) Data is directly transmitted on the public network, which will 3) When different edge applications on the same edge node access the cloud application in the cloud, all edge applications share the address of the edge node, which will cause the cloud application to lose the identity of the source address of the edge application Visibility, problems that lead to difficult auditing and tracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud and edge, edge and edge networking system based on three-layer security tunnel technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific implementation manners of the present application will be further described in detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present application, but not to limit the scope of the present application.

[0030] First, some terms involved in this application are introduced.

[0031] Cloud nodes refer to hosts / servers used in cloud computing.

[0032] Edge nodes refer to hosts / servers used in edge computing.

[0033] Internet Protocol (IP) address: Provides a unified address format that assigns a logical address to each network and each host on the Internet to shield the difference in physical addresses. It can be divided into public network address and private address. The public network address is in charge of the Internet Network Information Center (Internet NIC). These IP addresses are assigned to organizations that register and apply to the Inter NIC to access the Internet directly. P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a cloud-edge, edge-edge networking system based on three-layer security tunnel technology, which belongs to the field of communication technology, and includes the first edge node initiating a registration request; when the operation module in the cloud monitors the registration request , obtain the first public network address in the registration request; assign the first available network segment to the first edge node based on the first public network address; add the first node information of the first edge node to the configuration information of the connection module; The network information is sent to the first edge node; the first edge node establishes a first secure tunnel based on the connection address in the networking information using a layer-3 secure tunnel protocol, and establishes a second secure tunnel based on the second public network address in the networking information; The first edge application uses a private IP address to communicate with the cloud application based on the first secure tunnel, and communicates with the second edge application based on the second secure tunnel; it can solve the problem of complex IP address management and reduce the complexity of IP address management.

Description

technical field [0001] The present application relates to a cloud-edge, edge-edge networking system based on a three-layer security tunnel technology, which belongs to the field of communication technology. Background technique [0002] Cloud computing (cloud computing) is a kind of distributed computing, which refers to decomposing a huge data computing processing program into countless small programs through the network "cloud", and then processing and analyzing these programs through a system composed of multiple servers. The applet gets the result and returns it to the user. [0003] However, traditional cloud computing capabilities can no longer support the increasingly large-scale and geographically dispersed data processing and computing needs. Based on this, edge computing should rise in response. Edge computing refers to an open platform that integrates network, computing, storage, and application core capabilities on the side close to the source of objects or dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L12/46
CPCH04L63/0485H04L63/0272H04L12/4633H04L12/4641
Inventor 花磊耿浩涛张荣奇崔骥
Owner 江苏博云科技股份有限公司